A. Lavanya


Cybercrime is illegal involvements in computer financial transactions and a network. As individuals and businesses increase their reliance on technology, they are exposed to the growing cybercrime threats. Using the computers for our day- to-day transactions is quite common now days. For example, we pay our life insurance premium, electricity bills, reserve flight or train or bus tickets, order book or any other product online using personal computer, smart phones, public browsing centers etc. The number of users doing online transactions are growing rapidly ever since, because of the convenience it gives to the user to transact business without being physically present in the area where the transaction happens. Criminals committing cybercrime are also growing day-by-day with the increased number of users doing online transactions. Cybercrime covers a wide range of different attacks such as Cyber extortion, Cyber warfare, spreading Computer viruses or Malware, Internet fraud, Spamming, carding (fraud), Phishing, child activities and intellectual property rights violation etc. Because of increased cyber-attacks these days, the online users must be aware of this kind of attacks and need to cautions while doing online transactions. In this research paper we have discussed about new cryptography technique preventing the cybercrime based on the block cipher scheme. The aim of this research article is to identify the significant method of data protection to prevent the unauthorized persons. Furthermore, the proposed security techniques can implement on SSL, Digital signature, network security, etc.


Cybercrime, Digital Transactions, Computer Crime, Cyber Crimes In India, Information Technology Act 2000.


Burtescu E. (2009). “Database security-attacks and control methods”, Journal of applied quantitative methods, Vol4(4), June.

Grobler M, van Vuuren JJ, and Zaaiman J. (2013). “Preparing South Africa for Cyber Crime and Cyber Defense”, Systemics, cybernetics and Informatics value, Vol.11(7).

Malik M, and Patel T. (2016). “Database security–attacks and control methods”, International Journal of Information Sciences and Techniques (IJIST), Vol.6(1/2), March.

Prasanthi ML, and Ishwarya ASK. (2005). “Cyber Crime: Prevention & Detection ” , International Journal of Advanced Research in Computer and Communication Engineering, Vol. 4(3).

Sari A, and Karay M. (2015). “Reactive Data Security Approach and Review of Data Security Techniques in Wireless Networks”, Int. J. Communications, Network and System Sciences, Vol.8, pp.567-570.

• Other Bibliography

Barth A, Rubinstein BIP, Sundararajan M, Mitchell JC, Song D, and Bartlett PL. (2010). “A Learning-Based Approach to Reactive Security”, Proceedings of the 14th International Conference on Financial Cryptography and Data Security, pp.192- 206.

Brenner S. (2007). Law in an Era of Smart Technology. Oxford: Oxford University.

Jakimoski K. (2016). “Security Techniques for Data Protection in Cloud computing”, International Journal of Grid and Distributed Computing, Vol.9(1), pp.49-56.

Kuppuswamy P, and Chandrasekar C. (2010). “Optimizations of Public key Algorithm in Block Cipher using Negative Variables”, International Journal of Computer Science Research and Application, Vol.1(1), pp.11-23.

Nasir MS, and Kuppuswamy P. (2013). “Implementation of Biometric Security using Hybrid Combination of RSA and Simple Symmetric Key Algorithm”, International Journal of Innovative Research in Computer and Communication Engineering, Vol.1(8), October.

Olayemi OJ, (2014). “A socio-technological analysis of cybercrime and cyber security in Nigeria”, Academic Journals International Journal of Sociology and Anthropology, Vol. 6(3), March, pp. 116-125.

Sari A. (2012). “Impact of Determinants on Student Performance towards Information Communication Technology in Higher Education", International Journal of Learning and Development, Vol.2, pp.18-30.

South African Police Service. “Crime Report 2010/2011: South African Police Service (SAPS)”, [online],


  • There are currently no refbacks.

Send mail to with questions or comments about this web site. 

International Journal of Management and Social Sciences, All rights reserved.